773 research outputs found

    Mission and Safety Critical (MASC): An EVACS simulation with nested transactions

    Get PDF
    The Extra-Vehicular Activity Control System (EVACS) Simulation with Nested Transactions, a recent effort of the MISSION Kernel Team, is documented. The EVACS simulation is a simulation of some aspects of the Extra-Vehicular Activity Control System, in particular, just the selection of communication frequencies. The simulation is a tool to explore mission and safety critical (MASC) applications. For the purpose of this effort, its current definition is quite narrow serving only as a starting point for prototyping purposes. (Note that EVACS itself has been supplanted in a larger scenario of a lunar outpost with astronauts and a lunar rover). The frequency selection scenario was modified to embed its processing in nested transactions. Again as a first step, only two aspects of transaction support were implemented in this prototype: architecture and state recovery. Issues of concurrency and distribution are yet to be addressed

    A Detailed Comparison of UML and OWL

    Full text link
    As models and ontologies assume an increasingly central role in software and information systems engineering, the question of how exactly they compare and how they can sensibly be used together assumes growing importance. However, no study to date has systematically and comprehensively compared the two technology spaces, and a large variety of different bridging and integration ideas have been proposed in recent years without any detailed analysis of whether they are sound or useful. In this paper, we address this problem by providing a detailed and comprehensive comparison of the two technology spaces in terms of their flagship languages – UML and OWL – each a de facto and de jure standard in its respective space. To fully analyze the end user experience, we perform the comparison at two levels – one considering the underlying boundary assumptions and philosophy adopted by each language and the other considering their detailed features. We also consider all relevant auxiliary languages such as OCL. The resulting comparison clarifies the relationship between the two technologies and provides a solid foundation for deciding how to use them together or integrate them

    Just ‘students, old timers, and sammies’? Exploring the role of stewards and private matchday security in the plural policing of Scottish football

    Get PDF
    Football clubs in Scotland employ stewards to help to provide a safe and enjoyable matchday experience for spectators. However, stewarding at football matches in Scotland has recently been subject to criticism, particularly in regard to the professionalism of stewards. This article makes an original contribution to scholarship by exploring the role of stewards and private matchday security in Scottish football, drawing upon qualitative data from interviews with 35 participants who have a professional or personal interest in stewarding and the provision of safety and security at football events. The analysis traces the rise of stewarding in Scottish football, noting both challenges and improvements in event safety. Conceptually, we refract this rise, and the concomitant decline in policing resources, through the lens of plural policing, arguing that the policing of football events in Scotland represents a paradigm example of this shift within a reconfiguring field of policing provision and security governance

    ‘There is more than one sort of prison, Captain’:a popular criminology of prisons and penal regimes in Star Wars

    Get PDF
    In this paper we emphasise how science fiction, as a projection of the possible, can forewarn of dystopic dangers in emergent and future penal regimes. In this popular criminology we explore three archetypes of the prison as they have appeared across the Star Wars franchise: the panoptic prison; the labour camp; and the smart prison. The panoptic prison of the Galactic Republic invokes reflective nostalgia; prompting critical discussion of the deficiencies of the modern prison. Under the Galactic Empire prisons become labour camps, recalling the horrors of the Gulag as violent and cruel manifestations of underpinning ideology. Whilst the fall of the Galactic Empire signalled a return to governance based on democratic values, the representation of the smart prison in the New Republic continues to resonate as a techno-Gulag, reading as an allegory for a deeper crisis of liberal democracy. Analysed as such, prisons in Star Wars exist at the intersection of the past, present and possible futures of penal regimes, and in our current political climate can be a resource for resistance to technological trends and dystopic dangers. Star Wars, we conclude, and science fiction more broadly, is well-positioned to inform a radical re-imagining of future prisons and penal regimes

    Cyber-security internals of a Skoda Octavia vRS:a hands on approach

    Get PDF
    The convergence of information technology and vehicular technologies are a growing paradigm, allowing information to be sent by and to vehicles. This information can further be processed by the Electronic Control Unit (ECU) and the Controller Area Network (CAN) for in-vehicle communications or through a mobile phone or server for out-vehicle communication. Information sent by or to the vehicle can be life-critical (e.g. breaking, acceleration, cruise control, emergency communication, etc. . . ). As vehicular technology advances, in-vehicle networks are connected to external networks through 3 and 4G mobile networks, enabling manufacturer and customer monitoring of different aspects of the car. While these services provide valuable information, they also increase the attack surface of the vehicle, and can enable long and short range attacks. In this manuscript, we evaluate the security of the 2017 Skoda Octavia vRS 4x4. Both physical and remote attacks are considered, the key fob rolling code is successfully compromised, privacy attacks are demonstrated through the infotainment system, the Volkswagen Transport Protocol 2.0 is reverse engineered. Additionally, in-car attacks are highlighted and described, providing an overlook of potentially deadly threats by modifying ECU parameters and components enabling digital forensics investigation are identified
    • …
    corecore